Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

What is “Host Discovery” during WEP/WPA/LEAP attacks?

attacks Leap wep wpa
0
Posted

What is “Host Discovery” during WEP/WPA/LEAP attacks?

0

Since some attacks highly depend on the existance of associated clients or legitimate traffic, SILICAU goes into Host Discovery mode to locate clients in attempt to send spoofed deauthentication frames from the AP. If the deauthentication phase succeeds then it can help force reconnections or force the generation of a particular type of packet (ARP request, for example) that is needed for the particular attack to succeed. This is an important step in making attacks much faster. However if deauthentication is not successful then you will just have to wait passively for the type of traffic that you need. In the newest version of SILICAU there is a new feature to wait indefinitely for the needed element. This way you can walk away from SILICAU and let it work.

Related Questions

Thanksgiving questions

*Sadly, we had to bring back ads too. Hopefully more targeted.